Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I wouldn't underestimate that a PIN prevents this attack on machines that are powered off.

You can then go further up the chain with a UEFI settings password and no usb booting. If the password is hard to decrypt, then that's a pretty good approach.

Then there's custom Secure Boot certificates that replaces the ones from MS. It'll work for Linux, not sure about BitLocker. But my Surface tablet doesn't even support custom sb certs.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: